Skip to content

SQL: OIDC and access management#580

Open
kbatuigas wants to merge 12 commits into
rp-sqlfrom
DOC-1999-document-feature-oxla-oidc-authn-support
Open

SQL: OIDC and access management#580
kbatuigas wants to merge 12 commits into
rp-sqlfrom
DOC-1999-document-feature-oxla-oidc-authn-support

Conversation

@kbatuigas
Copy link
Copy Markdown
Contributor

@kbatuigas kbatuigas commented May 8, 2026

Description

This pull request introduces comprehensive documentation for Redpanda SQL's user and access management features, including new reference pages for user lifecycle statements and privilege management, as well as a guide for connecting with OpenID Connect (OIDC). It also updates the navigation to surface these new topics and ensure users can easily find information about authentication and authorization.

New user and access management documentation:

  • Added reference pages for the CREATE USER, ALTER USER, and DROP USER SQL statements, detailing syntax, usage, and examples for managing Redpanda SQL users. [1] [2] [3]
  • Added reference pages for the GRANT and REVOKE SQL statements, covering privilege assignment and removal on various database objects, including external sources and schemas. [1] [2]

OIDC authentication documentation:

  • Added a new how-to guide, connect-with-oidc.adoc, describing how to authenticate to Redpanda SQL using OIDC bearer tokens or client credentials, with step-by-step instructions and code examples for multiple clients.

Navigation and discoverability improvements:

  • Updated nav.adoc to include links to the new OIDC connection guide, user management, and privilege management topics, making these features easier to find in the documentation. [1] [2]

Resolves https://github.com/redpanda-data/documentation-private/issues/
Review deadline: 21 May

Page previews

Redpanda SQL > Connect to RP SQL > Connect to RP SQL with OIDC
Redpanda SQL > Manage RP SQL > Manage Access
Reference > Redpanda SQL Reference > Statements > CREATE USER
Reference > Redpanda SQL Reference > Statements > ALTER USER
Reference > Redpanda SQL Reference > Statements > DROP USER
Reference > Redpanda SQL Reference > Statements > GRANT
Reference > Redpanda SQL Reference > Statements > REVOKE

Checks

  • New feature
  • Content gap
  • Support Follow-up
  • Small fix (typos, links, copyedits, etc)

@netlify
Copy link
Copy Markdown

netlify Bot commented May 8, 2026

Deploy Preview for rp-cloud ready!

Name Link
🔨 Latest commit ccb45aa
🔍 Latest deploy log https://app.netlify.com/projects/rp-cloud/deploys/6a0d2fe33022030008a5a8ba
😎 Deploy Preview https://deploy-preview-580--rp-cloud.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify project configuration.

@coderabbitai
Copy link
Copy Markdown
Contributor

coderabbitai Bot commented May 8, 2026

Important

Review skipped

Auto reviews are disabled on base/target branches other than the default branch.

Please check the settings in the CodeRabbit UI or the .coderabbit.yaml file in this repository. To trigger a single review, invoke the @coderabbitai review command.

⚙️ Run configuration

Configuration used: Organization UI

Review profile: CHILL

Plan: Pro

Run ID: 4d3cf36b-fcdd-49ef-89b1-b9fb34a09ff8

You can disable this status message by setting the reviews.review_status to false in the CodeRabbit configuration file.

Use the checkbox below for a quick retry:

  • 🔍 Trigger review
✨ Finishing Touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests
  • Commit unit tests in branch DOC-1999-document-feature-oxla-oidc-authn-support

Comment @coderabbitai help to get the list of available commands and usage tips.

@kbatuigas kbatuigas force-pushed the DOC-1999-document-feature-oxla-oidc-authn-support branch from d22990c to 66401a7 Compare May 14, 2026 23:15
@kbatuigas kbatuigas force-pushed the DOC-1999-document-feature-oxla-oidc-authn-support branch from 243440f to da74bd4 Compare May 19, 2026 03:30
@kbatuigas kbatuigas marked this pull request as ready for review May 19, 2026 19:54
@kbatuigas kbatuigas requested a review from a team as a code owner May 19, 2026 19:54
@kbatuigas kbatuigas requested a review from grzebiel May 19, 2026 19:54
@kbatuigas kbatuigas changed the title SQL: OIDC SQL: OIDC and access management May 19, 2026
[source,bash]
----
PGPASSWORD="$BEARER_TOKEN" \
psql "host=<sql-host> port=<sql-port> dbname=oxla user=ignored options='auth_method=bearer' sslmode=require"
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

missing -c. 'auth_method=bearer' should be '-c auth_method=bearer'

[source,bash]
----
PGPASSWORD="$CLIENT_SECRET" \
psql "host=<sql-host> port=<sql-port> dbname=oxla user=<client-id> options='auth_method=client_secret' sslmode=require"
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

'auth_method=client_secret' should be '-c auth_method=client_secret'

Two distinct cluster settings affect TLS for OIDC:

* The cluster's SSL mode controls TLS on the `psql` connection to Redpanda SQL itself. To reject OIDC connections that aren't using TLS, configure the cluster to reject all non-TLS connections. See xref:security:authorization/gbac/gbac_dp.adoc[].
* `oidc.require_tls` (default `true`) controls whether Redpanda SQL uses HTTPS when contacting the identity provider: the OIDC discovery document URL, the JWKS endpoint, and the token endpoint for the client-credentials flow. This setting does not gate TLS on the client's `psql` connection.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We don't expose oidc.require_tls to customers. We should remove the bullet.


== Authentication

Redpanda Cloud preconfigures the SQL engine's OIDC settings when SQL is enabled on the cluster, so you do not need to configure an external identity provider for the SQL engine. The engine validates bearer tokens minted by Redpanda Cloud, regardless of whether you sign in to Redpanda Cloud with email and password or SSO.
Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

For SME: please confirm if this is correct and relevant

@kbatuigas kbatuigas requested a review from mattschumpert May 20, 2026 04:02
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants